Use this external-facing template to customize a cookie policy that provides users with a clear and comprehensive understanding of what cookies are, how they are...
|
|
Use this example as a starting point to documenting your data flow diagrams.
|
|
Use Info-Tech's Executive Presentation Template to present your diagnostic report findings and next steps.
|
|
Effective data security involves many moving parts, and will require support from a number of key individuals within the organization. The Data Security Technical Report...
|
|
Use this template to help document your information security compliance management program.
|
|
Plot your findings from the Workbook and Archive Document to see the current state of your cloud security architecture, the risks, and where you still need to go.
|
|
Once you have assessed your competency, process, and technology gaps, use this tool to set goals and create an action plan to remediate any gaps.
|
|
Use this template to document the exact process your organization uses when conducting a threat and risk assessment.
|
|
Identify relevant metrics to assist in evaluating the success of your organization's endpoint protection process.
|
|
This template offers a sample presentation of a risk management program, including an overview of the program and major risks.
|
|